Cisco 300-206
Get real exam questions for 300-206 Implementing Cisco Edge Network Security Solutions. 100% Free.
300-206 Premium VCE File
Learn More
100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours
Q1. Refer to the exhibit. Server A is a busy server that offers these services: . World Wide Web . DNS Which command captures http traffic from Host A to Server A? A. capture traffic match udp host 10.1.1.150 host 10.2.2.100 B. capture traffic match 80 host 10.1.1.150 host 10.2.2.100 C. capture traffic match ip 10.2.2.0 255.255.255.192 host 10.1.1.150 D. capture traffic match tcp host 10.
Q1. Which option describes the enhancements that SNMPv3 adds over 1 and 2 versions? A. Predefined events that generate message from the SNMP agent to the NMS B. Addition of authentication and privacy options C. Cleartext transmission of data between SNMP server and SNMP agent D. Addition of the ability to predefine events using traps E. Pooling of devices using GET-NEXT requests F. Use of t
Q1. Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports? A. complex threat detection B. scanning threat detection C. basic threat detection D. advanced threat detection View AnswerAnswer: B Q2. Refer to the exhibit. Which command can produce this packet tracer output on a firewall? A. packet-tracer input INSIDE tcp
Q1. Which set of commands creates a message list that includes all severity 2 (critical) messages on a Cisco security device? A. logging list critical_messages level 2 console logging critical_messages B. logging list critical_messages level 2 logging console critical_messages C. logging list critical_messages level 2 logging console enable critical_messages D. logging list enable critical
Q1. Which two TCP ports must be open on the Cisco Security Manager server to allow the server to communicate with the Cisco Security Manager client? (Choose two.) A. 1741 B. 443 C. 80 D. 1740 E. 8080 View AnswerAnswer: A,B Q2. According to the logging configuration on the Cisco ASA, what will happen if syslog server 10.10.2.40 fails? A. New connections through the ASA will be blocked an
Q1. Which statement about the configuration of Cisco ASA NetFlow v9 (NSEL) is true? A. Use a sysopt command to enable NSEL on a specific interface. B. To view bandwidth usage for NetFlow records, you must have QoS feature enabled C. NSEL tracks the flow continuously and provides updates every 10 seconds. D. You must define a flow-export event type under a policy. E. NSEL can be used without
Q1. Which two options are purposes of the packet-tracer command? (Choose two.) A. to filter and monitor ingress traffic to a switch B. to configure an interface-specific packet trace C. to simulate network traffic through a data path D. to debug packet drops in a production network E. to automatically correct an ACL entry in an ASA View AnswerAnswer: C,D Q2. CORRECT TEXT View AnswerAnsw
Q1. Which three options are default settings for NTP parameters on a Cisco device? (Choose three.) A. NTP authentication is enabled. B. NTP authentication is disabled. C. NTP logging is enabled. D. NTP logging is disabled. E. NTP access is enabled. F. NTP access is disabled. View AnswerAnswer: B,D,E Q2. What is a required attribute to configure NTP authentication on a Cisco ASA? A. Key
Q1. A rogue device has connected to the network and has become the STP root bridge, which has caused a network availability issue. Which two commands can protect against this problem? (Choose two.) A. switch(config)#spanning-tree portfast bpduguard default B. switch(config)#spanning-tree portfast bpdufilter default C. switch(config-if)#spanning-tree portfast D. switch(config-if)#spanning-tre
Q1. Refer to the exhibit. Which option describes the expected result of the capture ACL? A. The capture is applied, but we cannot see any packets in the capture B. The capture does not get applied and we get an error about mixed policy. C. The capture is applied and we can see the packets in the capture D. The capture is not applied because we must have a host IP as the source View AnswerAn
Q1. Which tool provides the necessary information to determine hardware lifecycle and compliance details for deployed network devices? A. Prime Infrastructure B. Prime Assurance C. Prime Network Registrar D. Prime Network Analysis Module View AnswerAnswer: A Q2. Which two options are protocols and tools that are used by the management plane when discussing Cisco ASA general management pla